diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index a49dc742e3..c97804c954 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -219,10 +219,10 @@ "description": "PoC for Dirty COW (CVE-2016-5195)", "fork": false, "created_at": "2016-10-22T15:25:34Z", - "updated_at": "2022-08-09T05:55:40Z", + "updated_at": "2022-08-13T09:36:00Z", "pushed_at": "2022-03-16T12:08:54Z", - "stargazers_count": 414, - "watchers_count": 414, + "stargazers_count": 415, + "watchers_count": 415, "forks_count": 146, "allow_forking": true, "is_template": false, @@ -230,7 +230,7 @@ "topics": [], "visibility": "public", "forks": 146, - "watchers": 414, + "watchers": 415, "score": 0 }, { @@ -307,18 +307,18 @@ "description": "Scan vuls kernel CVE-2016-5195 - DirtyCow", "fork": false, "created_at": "2016-10-29T08:45:45Z", - "updated_at": "2022-06-11T11:28:20Z", + "updated_at": "2022-08-13T07:54:38Z", "pushed_at": "2016-10-29T08:50:34Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 15, + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 15, - "watchers": 13, + "forks": 16, + "watchers": 14, "score": 0 }, { @@ -419,11 +419,11 @@ "description": "Dirty Cow exploit - CVE-2016-5195", "fork": false, "created_at": "2016-11-25T21:08:01Z", - "updated_at": "2022-08-11T13:35:58Z", + "updated_at": "2022-08-13T08:11:05Z", "pushed_at": "2021-04-08T11:35:12Z", "stargazers_count": 627, "watchers_count": 627, - "forks_count": 400, + "forks_count": 401, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -433,7 +433,7 @@ "exploit" ], "visibility": "public", - "forks": 400, + "forks": 401, "watchers": 627, "score": 0 }, diff --git a/2016/CVE-2016-7608.json b/2016/CVE-2016-7608.json index 700ffd4d2f..451d9f3143 100644 --- a/2016/CVE-2016-7608.json +++ b/2016/CVE-2016-7608.json @@ -13,10 +13,10 @@ "description": "CVE-2016-7608: Buffer overflow in IOFireWireFamily.", "fork": false, "created_at": "2017-08-19T20:49:26Z", - "updated_at": "2021-08-05T02:13:12Z", + "updated_at": "2022-08-13T08:24:55Z", "pushed_at": "2017-08-19T21:17:55Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index 7276059ef3..e819ed58d2 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -444,10 +444,10 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-07-31T02:45:52Z", + "updated_at": "2022-08-13T09:47:13Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 352, - "watchers_count": 352, + "stargazers_count": 353, + "watchers_count": 353, "forks_count": 115, "allow_forking": true, "is_template": false, @@ -455,7 +455,7 @@ "topics": [], "visibility": "public", "forks": 115, - "watchers": 352, + "watchers": 353, "score": 0 }, { diff --git a/2017/CVE-2017-8917.json b/2017/CVE-2017-8917.json index 90c9ff6f42..22438ed343 100644 --- a/2017/CVE-2017-8917.json +++ b/2017/CVE-2017-8917.json @@ -41,7 +41,7 @@ "description": "CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0 ", "fork": false, "created_at": "2017-11-19T16:50:39Z", - "updated_at": "2022-08-10T04:46:43Z", + "updated_at": "2022-08-13T09:00:49Z", "pushed_at": "2022-03-07T20:04:08Z", "stargazers_count": 40, "watchers_count": 40, diff --git a/2018/CVE-2018-16711.json b/2018/CVE-2018-16711.json index b981961a94..8193ab03bf 100644 --- a/2018/CVE-2018-16711.json +++ b/2018/CVE-2018-16711.json @@ -13,10 +13,10 @@ "description": "PoC code for CVE-2018-16711 (exploit by wrmsr)", "fork": false, "created_at": "2018-09-18T22:18:32Z", - "updated_at": "2021-07-20T21:00:48Z", + "updated_at": "2022-08-13T08:25:26Z", "pushed_at": "2018-09-25T12:15:50Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-16713.json b/2018/CVE-2018-16713.json index 04b3d7a5c2..b0356c7b4f 100644 --- a/2018/CVE-2018-16713.json +++ b/2018/CVE-2018-16713.json @@ -13,10 +13,10 @@ "description": "PoC code for CVE-2018-16713 (exploit by rdmsr)", "fork": false, "created_at": "2018-09-14T14:10:22Z", - "updated_at": "2021-07-20T21:00:49Z", + "updated_at": "2022-08-13T08:25:26Z", "pushed_at": "2018-09-25T12:15:56Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-18026.json b/2018/CVE-2018-18026.json index b43770150f..722936f55a 100644 --- a/2018/CVE-2018-18026.json +++ b/2018/CVE-2018-18026.json @@ -13,10 +13,10 @@ "description": "PoC Code for CVE-2018-18026 (exploit by stack overflow)", "fork": false, "created_at": "2018-10-18T16:51:26Z", - "updated_at": "2021-07-20T21:00:53Z", + "updated_at": "2022-08-13T08:25:28Z", "pushed_at": "2018-11-07T04:00:59Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-18714.json b/2018/CVE-2018-18714.json index a47037b8d9..656c588a89 100644 --- a/2018/CVE-2018-18714.json +++ b/2018/CVE-2018-18714.json @@ -13,10 +13,10 @@ "description": "PoC Code for CVE-2018-18714 (exploit by stack overflow)", "fork": false, "created_at": "2018-11-01T20:31:50Z", - "updated_at": "2022-04-25T02:36:26Z", + "updated_at": "2022-08-13T08:25:29Z", "pushed_at": "2018-11-09T21:08:46Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index b98c67deed..067d4a0d1b 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -102,10 +102,10 @@ "description": "CVE-2019-0708-exploit", "fork": false, "created_at": "2019-05-15T02:24:21Z", - "updated_at": "2022-07-20T03:16:02Z", + "updated_at": "2022-08-13T08:25:39Z", "pushed_at": "2019-05-15T02:26:46Z", - "stargazers_count": 120, - "watchers_count": 120, + "stargazers_count": 119, + "watchers_count": 119, "forks_count": 25, "allow_forking": true, "is_template": false, @@ -113,7 +113,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 120, + "watchers": 119, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 04a5849070..e08cb3f60c 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -41,10 +41,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-08-12T06:32:07Z", + "updated_at": "2022-08-13T07:32:07Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3479, - "watchers_count": 3479, + "stargazers_count": 3480, + "watchers_count": 3480, "forks_count": 1025, "allow_forking": true, "is_template": false, @@ -72,7 +72,7 @@ ], "visibility": "public", "forks": 1025, - "watchers": 3479, + "watchers": 3480, "score": 0 }, { diff --git a/2019/CVE-2019-17564.json b/2019/CVE-2019-17564.json index 4c3eba729a..dc7ebf4061 100644 --- a/2019/CVE-2019-17564.json +++ b/2019/CVE-2019-17564.json @@ -158,10 +158,10 @@ "description": "CVE-2019-17564:Apache Dubbo反序列化漏洞", "fork": false, "created_at": "2020-02-24T07:46:36Z", - "updated_at": "2021-12-15T14:38:25Z", + "updated_at": "2022-08-13T08:17:13Z", "pushed_at": "2020-02-24T07:54:05Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 5, "allow_forking": true, "is_template": false, @@ -169,7 +169,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 9, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17571.json b/2019/CVE-2019-17571.json index 343398d07b..a9314ca077 100644 --- a/2019/CVE-2019-17571.json +++ b/2019/CVE-2019-17571.json @@ -13,10 +13,10 @@ "description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞", "fork": false, "created_at": "2019-12-25T16:46:11Z", - "updated_at": "2022-06-16T12:05:42Z", + "updated_at": "2022-08-13T08:15:00Z", "pushed_at": "2019-12-25T16:48:41Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 76, + "watchers_count": 76, "forks_count": 7, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 75, + "watchers": 76, "score": 0 }, { diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index b0b85f197e..79dceabcef 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -13,10 +13,10 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-07-31T02:45:52Z", + "updated_at": "2022-08-13T09:47:13Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 352, - "watchers_count": 352, + "stargazers_count": 353, + "watchers_count": 353, "forks_count": 115, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 115, - "watchers": 352, + "watchers": 353, "score": 0 }, { diff --git a/2019/CVE-2019-8601.json b/2019/CVE-2019-8601.json index 6f8d35e1c9..eba3b65ec9 100644 --- a/2019/CVE-2019-8601.json +++ b/2019/CVE-2019-8601.json @@ -13,10 +13,10 @@ "description": "Exploiting a patched vulnerability in JavaScriptCore", "fork": false, "created_at": "2020-01-02T00:12:22Z", - "updated_at": "2022-07-20T14:57:51Z", + "updated_at": "2022-08-13T08:38:46Z", "pushed_at": "2020-01-02T00:13:22Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 13, + "watchers": 14, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0014.json b/2020/CVE-2020-0014.json index a6e4dd37cf..a100630c8e 100644 --- a/2020/CVE-2020-0014.json +++ b/2020/CVE-2020-0014.json @@ -13,10 +13,10 @@ "description": "CVE-2020-0014-Toast-复现", "fork": false, "created_at": "2020-09-04T09:02:29Z", - "updated_at": "2020-11-25T07:28:27Z", + "updated_at": "2022-08-13T09:38:09Z", "pushed_at": "2020-09-07T06:34:42Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 4, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index deea32c898..f66634d3bc 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-08-12T06:32:07Z", + "updated_at": "2022-08-13T07:32:07Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3479, - "watchers_count": 3479, + "stargazers_count": 3480, + "watchers_count": 3480, "forks_count": 1025, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 1025, - "watchers": 3479, + "watchers": 3480, "score": 0 }, { diff --git a/2020/CVE-2020-15999.json b/2020/CVE-2020-15999.json index f1d99c644a..754bfd79d9 100644 --- a/2020/CVE-2020-15999.json +++ b/2020/CVE-2020-15999.json @@ -69,10 +69,10 @@ "description": "Todos los materiales necesarios para la PoC en Chrome y ftview", "fork": false, "created_at": "2020-12-30T19:58:33Z", - "updated_at": "2021-07-20T20:36:40Z", + "updated_at": "2022-08-13T08:25:57Z", "pushed_at": "2021-01-04T15:01:14Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -80,7 +80,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-16012.json b/2020/CVE-2020-16012.json index 3118dcd55c..2fff90fc58 100644 --- a/2020/CVE-2020-16012.json +++ b/2020/CVE-2020-16012.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2020-16012, a timing side channel in drawImage in Firefox & Chrome", "fork": false, "created_at": "2020-11-14T21:32:15Z", - "updated_at": "2021-07-20T20:36:42Z", + "updated_at": "2022-08-13T08:25:56Z", "pushed_at": "2021-01-11T17:57:36Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 9, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index aaf4b96006..da1d548a37 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -102,10 +102,10 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2022-08-09T05:55:44Z", + "updated_at": "2022-08-13T08:10:31Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 416, - "watchers_count": 416, + "stargazers_count": 417, + "watchers_count": 417, "forks_count": 61, "allow_forking": true, "is_template": false, @@ -113,7 +113,7 @@ "topics": [], "visibility": "public", "forks": 61, - "watchers": 416, + "watchers": 417, "score": 0 }, { diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index f51e361df7..3cd1e235a7 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -41,10 +41,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2022-08-11T19:25:52Z", + "updated_at": "2022-08-13T07:31:18Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1592, - "watchers_count": 1592, + "stargazers_count": 1593, + "watchers_count": 1593, "forks_count": 572, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 572, - "watchers": 1592, + "watchers": 1593, "score": 0 }, { diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 4f81cad9bb..7b4cc9c346 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -125,10 +125,10 @@ "description": "CVE-2021-22986 F5 BIG-IP iControl 命令执行漏洞", "fork": false, "created_at": "2021-03-21T07:40:51Z", - "updated_at": "2021-07-20T20:19:13Z", + "updated_at": "2022-08-13T08:25:58Z", "pushed_at": "2021-03-21T07:40:59Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 4, "allow_forking": true, "is_template": false, @@ -138,7 +138,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 5, + "watchers": 4, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 3e9aad6765..427737a637 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -1249,10 +1249,10 @@ "description": "Python exploit code for CVE-2021-4034 (pwnkit)", "fork": false, "created_at": "2022-01-26T17:53:16Z", - "updated_at": "2022-08-01T14:37:07Z", + "updated_at": "2022-08-13T08:35:38Z", "pushed_at": "2022-01-28T00:29:15Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 74, + "watchers_count": 74, "forks_count": 24, "allow_forking": true, "is_template": false, @@ -1260,7 +1260,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 73, + "watchers": 74, "score": 0 }, { diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 592ab1a8c0..9406fe79e8 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,7 +13,7 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2022-08-05T14:42:15Z", + "updated_at": "2022-08-13T07:55:20Z", "pushed_at": "2022-07-10T22:23:13Z", "stargazers_count": 829, "watchers_count": 829, @@ -46,10 +46,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2022-08-05T21:36:47Z", + "updated_at": "2022-08-13T09:49:58Z", "pushed_at": "2022-04-25T07:53:41Z", - "stargazers_count": 376, - "watchers_count": 376, + "stargazers_count": 377, + "watchers_count": 377, "forks_count": 76, "allow_forking": true, "is_template": false, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 76, - "watchers": 376, + "watchers": 377, "score": 0 }, { diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 843e7cc6d2..5e8c23a88e 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,10 +13,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2022-08-08T06:20:54Z", + "updated_at": "2022-08-13T09:50:13Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1128, - "watchers_count": 1128, + "stargazers_count": 1129, + "watchers_count": 1129, "forks_count": 295, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 295, - "watchers": 1128, + "watchers": 1129, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 1f8ab16ec0..09eaa7ebd0 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -250,10 +250,10 @@ "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2022-08-07T14:46:38Z", + "updated_at": "2022-08-13T11:01:33Z", "pushed_at": "2022-08-02T13:18:24Z", - "stargazers_count": 1001, - "watchers_count": 1001, + "stargazers_count": 1000, + "watchers_count": 1000, "forks_count": 447, "allow_forking": true, "is_template": false, @@ -263,7 +263,7 @@ ], "visibility": "public", "forks": 447, - "watchers": 1001, + "watchers": 1000, "score": 0 }, { @@ -4192,10 +4192,10 @@ "description": "Small example repo for looking into log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-15T19:59:38Z", - "updated_at": "2022-07-26T11:23:19Z", + "updated_at": "2022-08-13T12:16:57Z", "pushed_at": "2021-12-24T15:44:53Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -4203,7 +4203,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 63, + "watchers": 64, "score": 0 }, { diff --git a/2021/CVE-2021-45105.json b/2021/CVE-2021-45105.json index 45eeedc67d..bd52442445 100644 --- a/2021/CVE-2021-45105.json +++ b/2021/CVE-2021-45105.json @@ -100,10 +100,10 @@ "description": "log4j2 dos exploit,CVE-2021-45105 exploit,Denial of Service poc", "fork": false, "created_at": "2021-12-20T10:52:20Z", - "updated_at": "2022-03-30T10:13:10Z", + "updated_at": "2022-08-13T07:08:57Z", "pushed_at": "2021-12-22T02:37:35Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -111,7 +111,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0 }, { diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index 40847c0b0f..b316452f69 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -69,10 +69,10 @@ "description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测", "fork": false, "created_at": "2022-05-07T17:54:08Z", - "updated_at": "2022-08-03T17:35:33Z", + "updated_at": "2022-08-13T08:05:58Z", "pushed_at": "2022-05-09T11:15:27Z", - "stargazers_count": 81, - "watchers_count": 81, + "stargazers_count": 82, + "watchers_count": 82, "forks_count": 23, "allow_forking": true, "is_template": false, @@ -80,7 +80,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 81, + "watchers": 82, "score": 0 }, { diff --git a/2022/CVE-2022-2022.json b/2022/CVE-2022-2022.json index 135076bd0e..232b2daeb4 100644 --- a/2022/CVE-2022-2022.json +++ b/2022/CVE-2022-2022.json @@ -17,13 +17,13 @@ "pushed_at": "2022-08-03T08:39:29Z", "stargazers_count": 310, "watchers_count": 310, - "forks_count": 133, + "forks_count": 134, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 133, + "forks": 134, "watchers": 310, "score": 0 } diff --git a/2022/CVE-2022-21881.json b/2022/CVE-2022-21881.json index 3e2d9ff8da..1460b92c3e 100644 --- a/2022/CVE-2022-21881.json +++ b/2022/CVE-2022-21881.json @@ -13,18 +13,18 @@ "description": "POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox", "fork": false, "created_at": "2022-08-09T14:16:40Z", - "updated_at": "2022-08-13T05:36:14Z", + "updated_at": "2022-08-13T09:34:44Z", "pushed_at": "2022-08-09T14:28:48Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 2, + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 2, + "forks": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 214dabc8af..50ed88ea8a 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -687,10 +687,10 @@ "description": "CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell", "fork": false, "created_at": "2022-03-08T09:32:36Z", - "updated_at": "2022-08-08T19:48:33Z", + "updated_at": "2022-08-13T07:14:35Z", "pushed_at": "2022-03-08T09:36:31Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 7, "allow_forking": true, "is_template": false, @@ -698,7 +698,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 12, + "watchers": 13, "score": 0 }, { @@ -855,10 +855,10 @@ "description": "spring-cloud-gateway-rce CVE-2022-22947", "fork": false, "created_at": "2022-03-13T10:00:21Z", - "updated_at": "2022-04-08T02:40:09Z", + "updated_at": "2022-08-13T10:10:14Z", "pushed_at": "2022-07-13T02:38:10Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -866,7 +866,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index f93d6e5825..af42f31553 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -122,10 +122,10 @@ "description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit", "fork": false, "created_at": "2022-03-31T00:24:28Z", - "updated_at": "2022-08-10T12:41:18Z", + "updated_at": "2022-08-13T12:15:07Z", "pushed_at": "2022-08-04T18:26:18Z", - "stargazers_count": 263, - "watchers_count": 263, + "stargazers_count": 264, + "watchers_count": 264, "forks_count": 206, "allow_forking": true, "is_template": false, @@ -133,7 +133,7 @@ "topics": [], "visibility": "public", "forks": 206, - "watchers": 263, + "watchers": 264, "score": 0 }, { diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json index 10be9536bc..3e5d93a043 100644 --- a/2022/CVE-2022-2588.json +++ b/2022/CVE-2022-2588.json @@ -13,10 +13,10 @@ "description": "exploit for CVE-2022-2588", "fork": false, "created_at": "2022-08-11T06:01:24Z", - "updated_at": "2022-08-12T13:18:17Z", + "updated_at": "2022-08-13T11:57:03Z", "pushed_at": "2022-08-11T06:04:18Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 20, + "watchers": 22, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index c7b61fd021..fafb832b1d 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-08-12T17:40:46Z", + "updated_at": "2022-08-13T12:15:27Z", "pushed_at": "2022-08-11T09:35:18Z", - "stargazers_count": 638, - "watchers_count": 638, + "stargazers_count": 640, + "watchers_count": 640, "forks_count": 121, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 121, - "watchers": 638, + "watchers": 640, "score": 0 }, { diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index 51c2b050d3..32cf256c73 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -325,10 +325,10 @@ "description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ", "fork": false, "created_at": "2022-05-20T14:26:38Z", - "updated_at": "2022-08-12T21:22:50Z", + "updated_at": "2022-08-13T07:47:53Z", "pushed_at": "2022-08-02T19:06:30Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -343,7 +343,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 22, + "watchers": 23, "score": 0 }, { @@ -640,10 +640,10 @@ "description": "警惕 一种针对红队的新型溯源手段!", "fork": false, "created_at": "2022-07-27T15:48:19Z", - "updated_at": "2022-08-12T07:43:34Z", + "updated_at": "2022-08-13T09:06:26Z", "pushed_at": "2022-07-27T15:55:01Z", - "stargazers_count": 289, - "watchers_count": 289, + "stargazers_count": 290, + "watchers_count": 290, "forks_count": 64, "allow_forking": true, "is_template": false, @@ -651,7 +651,7 @@ "topics": [], "visibility": "public", "forks": 64, - "watchers": 289, + "watchers": 290, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-27925.json b/2022/CVE-2022-27925.json index 36bdca25cd..0b1eda694a 100644 --- a/2022/CVE-2022-27925.json +++ b/2022/CVE-2022-27925.json @@ -13,10 +13,10 @@ "description": "Zimbra RCE simple poc", "fork": false, "created_at": "2022-08-12T18:35:52Z", - "updated_at": "2022-08-13T04:29:15Z", + "updated_at": "2022-08-13T11:20:12Z", "pushed_at": "2022-08-12T18:37:57Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-31101.json b/2022/CVE-2022-31101.json index 996d5f4aba..7b3a962941 100644 --- a/2022/CVE-2022-31101.json +++ b/2022/CVE-2022-31101.json @@ -47,11 +47,11 @@ "description": "Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)", "fork": false, "created_at": "2022-08-09T10:29:48Z", - "updated_at": "2022-08-11T15:58:40Z", + "updated_at": "2022-08-13T11:20:52Z", "pushed_at": "2022-08-09T14:55:35Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 3, + "stargazers_count": 13, + "watchers_count": 13, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -62,8 +62,8 @@ "prestashop" ], "visibility": "public", - "forks": 3, - "watchers": 12, + "forks": 4, + "watchers": 13, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-33980.json b/2022/CVE-2022-33980.json index fcc5205001..00f4180584 100644 --- a/2022/CVE-2022-33980.json +++ b/2022/CVE-2022-33980.json @@ -69,10 +69,10 @@ "description": "CVE", "fork": false, "created_at": "2022-08-10T03:21:19Z", - "updated_at": "2022-08-13T05:52:00Z", + "updated_at": "2022-08-13T09:36:08Z", "pushed_at": "2022-08-10T03:25:06Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 5, "allow_forking": true, "is_template": false, @@ -80,7 +80,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 22, + "watchers": 23, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json index 76ccbfde37..4acbb303bf 100644 --- a/2022/CVE-2022-34918.json +++ b/2022/CVE-2022-34918.json @@ -154,7 +154,7 @@ "fork": false, "created_at": "2022-08-02T09:52:02Z", "updated_at": "2022-08-12T18:49:57Z", - "pushed_at": "2022-08-05T14:46:52Z", + "pushed_at": "2022-08-13T08:14:07Z", "stargazers_count": 131, "watchers_count": 131, "forks_count": 22, diff --git a/2022/CVE-2022-36446.json b/2022/CVE-2022-36446.json index d7121d9f39..10920b4182 100644 --- a/2022/CVE-2022-36446.json +++ b/2022/CVE-2022-36446.json @@ -13,10 +13,10 @@ "description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.", "fork": false, "created_at": "2022-08-11T11:47:17Z", - "updated_at": "2022-08-13T05:16:43Z", + "updated_at": "2022-08-13T11:14:49Z", "pushed_at": "2022-08-11T19:25:11Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 17, + "watchers": 18, "score": 0 } ] \ No newline at end of file